US5465349A - System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts - Google Patents

System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts Download PDF

Info

Publication number
US5465349A
US5465349A US08/384,531 US38453194A US5465349A US 5465349 A US5465349 A US 5465349A US 38453194 A US38453194 A US 38453194A US 5465349 A US5465349 A US 5465349A
Authority
US
United States
Prior art keywords
microprocessor
register
memory
integrated circuit
memory means
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/384,531
Inventor
Francois Geronimi
Paul Sourenian
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gemplus SA
Original Assignee
Gemplus Card International SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gemplus Card International SA filed Critical Gemplus Card International SA
Priority to US08/384,531 priority Critical patent/US5465349A/en
Application granted granted Critical
Publication of US5465349A publication Critical patent/US5465349A/en
Anticipated expiration legal-status Critical
Expired - Lifetime legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/10Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means together with a coded signal, e.g. in the form of personal identification information, like personal identification number [PIN] or biometric data
    • G07F7/1008Active credit-cards provided with means to personalise their use, e.g. with PIN-introduction/comparison system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0716Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips at least one of the integrated circuit chips comprising a sensor or an interface to a sensor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/073Special arrangements for circuits, e.g. for protecting identification code in memory
    • G06K19/07309Means for preventing undesired reading or writing from or onto record carriers
    • G06K19/07372Means for preventing undesired reading or writing from or onto record carriers by detecting tampering with the circuit
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/341Active cards, i.e. cards including their own processing means, e.g. including an IC or chip
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07FCOIN-FREED OR LIKE APPARATUS
    • G07F7/00Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus
    • G07F7/08Mechanisms actuated by objects other than coins to free or to actuate vending, hiring, coin or paper currency dispensing or refunding apparatus by coded identity card or credit card or other personal identification means
    • G07F7/0806Details of the card
    • G07F7/0813Specific details related to card security
    • G07F7/082Features insuring the integrity of the data on or in the card

Definitions

  • the invention relates to integrated circuits for which security of operation has to be provided against attempts at fraudulent use.
  • a frequency sensor that observes the working frequency of the circuit and is capable of giving a signal if this frequency is below a determined threshold (an excessively low frequency would make it easier for a spy to get a peep into the behavior of the circuit or of the card).
  • a supply voltage sensor that provides a signal if this voltage is too low or too high.
  • a light sensor that detects any instance where the package of the integrated circuit is opened in order to obtain access, by observation, to confidential information.
  • a passivation sensor to sense the presence of a passivation layer above the circuit
  • a temperature sensor etc.
  • microprocessor-based integrated circuits it is normal to design the system so that the security check to be conducted by the microprocessor of the circuit itself.
  • the circuits work as follows: when the voltage is turned on, the microprocessor carries out an initialization program. Then it carries out a security test in which the state of the security register is verified. If all the bits are at zero, the operation may continue. If not, the operation is definitively interrupted and the circuit must be turned off.
  • means are provided, in the integrated circuit, to test the state of the register, firstly before each transmission of information to the exterior of the integrated circuit and, secondly, before each modification of information in a memory that forms part of the integrated circuit (in general, this memory will be an electrically programmable non-volatile memory or an electrically programmable and erasable non-volatile memory).
  • the starting point of the invention is the observation that the microprocessor-based integrated circuits are controlled by a program read-only memory (ROM) that comprises a certain number of sub-programs including a program for writing or erasing in the memory and a program for the transmission of information to the exterior: it is then easy to place instructions, at the head of each of these sub-programs, to check the state of the security register.
  • ROM program read-only memory
  • the register may be tested and may interrupt the sub-program as soon as it starts or immediately after it has started.
  • a chip card memory program has 5,000 bytes of instructions that can be carried out by the microprocessor.
  • the writing or erasure programs or the programs for the transmission of information to the exterior include, for example, about a hundred instructions each (to write or transmit a byte); about twenty additional bytes may enable the test to be made before these sub-programs.
  • the memory will use up only a small number of additional bytes to provide for very efficient security since the checking takes place before the strategic operations for the writing and transmission of information.
  • FIG. 1 shows the general organization of a microprocessor-based integrated circuit concerned by the invention
  • FIG. 2 shows the organization of the means according to the invention.
  • the integrated circuit has a microprocessor, namely a central processing unit (CPU) 10 and associated resources which may be:
  • CPU central processing unit
  • ROM 12 a read-only memory (ROM) 12 containing instructions that can be carried out by the microprocessor
  • RAM random-access memory
  • EPROM electrically programmable memory
  • EEPROM electrically erasable
  • input/output ports 18 making it possible, notably, to transmit information on external connection pins I/O of the integrated circuit (the transmission will generally be done serially to minimize the number of pins of the circuit, at least in chip card applications).
  • microprocessor is directly connected to registers, the contents of which it can read and which it can reset at zero.
  • RS register there is an RS register, the inputs of which are connected to various security sensors (C1, C2, C3, C4 for example) such as those mentioned here above.
  • these sensors are designed to check the environmental conditions and the conditions of operation of the circuit in order to prevent fraudulent operations that would become possible if these conditions were to become abnormal. Examples of sensors have been given here above.
  • This RS register will be tested according to the invention whenever the program of application of the card (in a ROM or EEPROM memory) involves an operation for the transmission of information to the exterior (by the I/O contact) and also whenever the program involves an operation to modify the contents of the non-volatile memory 16.
  • the memory is addressed sequentially, in such a way that the instructions memorized at successive addresses are carried out successively, except for successive instructions for skipping to a different location of the memory.
  • a starting zone of the memory Z0 contains, for example, an initialization program enabling the microprocessor to carry out preliminary operations after the system is turned on (these preliminary operations include, notably, the zero-setting of the RS register).
  • preliminary operations include, notably, the zero-setting of the RS register.
  • an operation to test the RS register is carried out at the end of the initialization program.
  • the conditions of environment and operation of the circuit would indeed have to be normal in order that the circuit may be permitted to function. If the test is positive (with the RS register at zero and no detection of abnormal conditions), then the operation of the integrated circuit continues. If the test is negative (if the register contains a bit relating to the detection of an abnormal condition), then an instruction of routing towards a zone ZF of the ROM is carried out. In this zone ZF, there is placed an instruction or routine placing the microprocessor on standby, and the microprocessor cannot leave this standby state except by reinitialization (for example by being disconnected and turned on again).
  • Zones of the program memory 12 are used to carry out various operations.
  • the microprocessor may obtain access to the first address of each of these zones when it receives a command to carry out a certain operation.
  • the zone then contains the series of instructions necessary for the performance of this operation. It is, for example, an application program placed in the EEPROM 16, a program that can be carried out by the microprocessor, which calls up sub-programs placed in the zones of the read-only memory 12 when it has need of them.
  • n-bit word for example an 8-bit byte
  • This operation is carried out by means of a sub-program contained in a zone Z1 of the ROM. This sub-program is called upon whenever a word has to be transmitted.
  • Another operation carried out by a sub-program is the operation for writing a word or a bit in the non-volatile programmable memory 16.
  • the corresponding instructions form a sub-program placed in a zone Z2 of the read-only memory.
  • an operation for the erasure of all or part of the programmable memory 16 is carried out by a sub-program placed in a zone Z3 of the read-only memory 12.
  • the first instructions of the zones Z1, Z2 and Z3 will be instructions for checking the state of the RS register, this register being directly accessible in reading mode by the microprocessor. If the result is positive (with normal conditions being detected by the sensors C1 to C4), the sub-program of the zone Z1, Z2 or Z3 respectively is carried out and the corresponding operation (transmission, writing or erasure respectively) is performed. If not, a routing instruction towards the zone ZF is carried out and the microprocessor is placed on definitive standby.

Abstract

The invention relates to integrated circuits and, notably, to circuits for which it is desired to provide security against any fraudulent usage. The circuits concerned are microprocessor circuits having a program memory, a programmable non-volatile memory, at least one input/output port and an RS register memorizing the signals from sensors of abnormal conditions. This register is accessible by the microprocessor. There is provision for means to check the state of the register immediately before any operation for the writing or erasure of the programmable memory, and immediately before any transmission of data towards the exterior of the input/output port, and means to interrupt the working of the microprocessor if the check reveals abnormal conditions.

Description

This application is a continuation of U.S. patent application Ser. No. 07/779,817, filed Oct. 21, 1991, now abandoned.
BACKGROUND OF THE INVENTION
1. Field of the Invention
The invention relates to integrated circuits for which security of operation has to be provided against attempts at fraudulent use.
This is the case notably with integrated circuits for chip cards designed, for example, to carry out monetary transactions or to enable access by specific individuals to protected premises etc.
These integrated circuits incorporate confidential information elements, stored in memories, for example non-volatile, electrically erasable, and programmable memories. It is necessary that these information elements are not sent out of the circuit through fraudulent operations.
2. Description of the Prior Art
This is why there is generally provision, in the integrated circuit, for a certain number of sensors known as security sensors, the function of which is to observe a certain number of operational or environmental conditions and prompt a break in the functioning of the circuit when abnormal conditions are detected.
For example, there is a frequency sensor that observes the working frequency of the circuit and is capable of giving a signal if this frequency is below a determined threshold (an excessively low frequency would make it easier for a spy to get a peep into the behavior of the circuit or of the card).
In the same way, there may be a supply voltage sensor that provides a signal if this voltage is too low or too high. And again, a light sensor that detects any instance where the package of the integrated circuit is opened in order to obtain access, by observation, to confidential information. Again, for example, there may be a passivation sensor (to sense the presence of a passivation layer above the circuit), a temperature sensor etc.
Thus, several physical safety sensors are provided, and each of them may deliver a logic signal representing the appearance of a fault.
In microprocessor-based integrated circuits, it is normal to design the system so that the security check to be conducted by the microprocessor of the circuit itself.
It has already been proposed that the logic signals coming from the physical safety sensors should be memorized in a register that is directly controlled by the microprocessor. This register is initially set at zero. The appearance of a non-null bit at a position of the register means that an abnormal condition of operation has been observed. The flipping-over of the register is irreversible in principle, i.e. a bit stored in the register does not disappear even if the abnormal conditions disappear. In practice, the register cannot be reset at zero unless the integrated circuit is reinitialized (i.e. disconnected and turned on again)
In principle, the circuits work as follows: when the voltage is turned on, the microprocessor carries out an initialization program. Then it carries out a security test in which the state of the security register is verified. If all the bits are at zero, the operation may continue. If not, the operation is definitively interrupted and the circuit must be turned off.
It has been observed however that the security is insufficient since subsequent changes can no longer be detected.
A possible approach would be to see to it that the working programs of the card all contain instructions for the periodic checking of the state of the register. However, the problem is that this would greatly interfere with the normal progress of the program, and that it is difficult to provide for a test of the register as frequently as would be needed.
It is also possible to have the register connected to a switching pin of the central unit of the microprocessor, but these pins are not numerous and have to be reserved for other uses.
SUMMARY OF THE INVENTION
According to the invention, means are provided, in the integrated circuit, to test the state of the register, firstly before each transmission of information to the exterior of the integrated circuit and, secondly, before each modification of information in a memory that forms part of the integrated circuit (in general, this memory will be an electrically programmable non-volatile memory or an electrically programmable and erasable non-volatile memory).
The starting point of the invention is the observation that the microprocessor-based integrated circuits are controlled by a program read-only memory (ROM) that comprises a certain number of sub-programs including a program for writing or erasing in the memory and a program for the transmission of information to the exterior: it is then easy to place instructions, at the head of each of these sub-programs, to check the state of the security register.
These programs are often used, and they correspond precisely to actions for which security is important, namely when there is a risk that confidential information might be transmitted to the exterior, or a risk of unauthorized writing or erasure in unauthorized zones of the memory. With a small number of program instructions, the register may be tested and may interrupt the sub-program as soon as it starts or immediately after it has started.
For example, a chip card memory program has 5,000 bytes of instructions that can be carried out by the microprocessor. The writing or erasure programs or the programs for the transmission of information to the exterior include, for example, about a hundred instructions each (to write or transmit a byte); about twenty additional bytes may enable the test to be made before these sub-programs.
Thus, the memory will use up only a small number of additional bytes to provide for very efficient security since the checking takes place before the strategic operations for the writing and transmission of information.
BRIEF DESCRIPTION OF THE DRAWINGS
Other features and advantages of the invention will appear from the following detailed description, made with reference to the appended drawings, of which:
FIG. 1 shows the general organization of a microprocessor-based integrated circuit concerned by the invention;
FIG. 2 shows the organization of the means according to the invention.
MORE DETAILED DESCRIPTION
The integrated circuit has a microprocessor, namely a central processing unit (CPU) 10 and associated resources which may be:
a read-only memory (ROM) 12 containing instructions that can be carried out by the microprocessor;
a working random-access memory (RAM) 14;
a non-volatile electrically programmable memory (EPROM) 16 and, preferably, one that is also electrically erasable (EEPROM). This memory may include data and possibly instructions for the microprocessor. It may include, notably, data elements the contents of which should not be touched and confidential data which should not be transmitted to the exterior of the circuit;
input/output ports 18 making it possible, notably, to transmit information on external connection pins I/O of the integrated circuit (the transmission will generally be done serially to minimize the number of pins of the circuit, at least in chip card applications).
Furthermore, the microprocessor is directly connected to registers, the contents of which it can read and which it can reset at zero.
Among these registers, there is an RS register, the inputs of which are connected to various security sensors (C1, C2, C3, C4 for example) such as those mentioned here above.
As has been explained, these sensors are designed to check the environmental conditions and the conditions of operation of the circuit in order to prevent fraudulent operations that would become possible if these conditions were to become abnormal. Examples of sensors have been given here above.
This RS register will be tested according to the invention whenever the program of application of the card (in a ROM or EEPROM memory) involves an operation for the transmission of information to the exterior (by the I/O contact) and also whenever the program involves an operation to modify the contents of the non-volatile memory 16.
These operations are controlled by the microprocessor, by means of sub-programs stored in the read-only memory ROM 12 which manages the entire operation of the card. The organization of the read-only memory 12 is represented symbolically in FIG. 2.
The memory is addressed sequentially, in such a way that the instructions memorized at successive addresses are carried out successively, except for successive instructions for skipping to a different location of the memory.
A starting zone of the memory Z0 contains, for example, an initialization program enabling the microprocessor to carry out preliminary operations after the system is turned on (these preliminary operations include, notably, the zero-setting of the RS register). Preferably, an operation to test the RS register is carried out at the end of the initialization program. At this stage, the conditions of environment and operation of the circuit would indeed have to be normal in order that the circuit may be permitted to function. If the test is positive (with the RS register at zero and no detection of abnormal conditions), then the operation of the integrated circuit continues. If the test is negative (if the register contains a bit relating to the detection of an abnormal condition), then an instruction of routing towards a zone ZF of the ROM is carried out. In this zone ZF, there is placed an instruction or routine placing the microprocessor on standby, and the microprocessor cannot leave this standby state except by reinitialization (for example by being disconnected and turned on again).
Other zones of the program memory 12 are used to carry out various operations. The microprocessor may obtain access to the first address of each of these zones when it receives a command to carry out a certain operation. The zone then contains the series of instructions necessary for the performance of this operation. It is, for example, an application program placed in the EEPROM 16, a program that can be carried out by the microprocessor, which calls up sub-programs placed in the zones of the read-only memory 12 when it has need of them.
Among the possible operations, there is the transmission, to the exterior, of an n-bit word (for example an 8-bit byte) through the input/output port 18. This operation is carried out by means of a sub-program contained in a zone Z1 of the ROM. This sub-program is called upon whenever a word has to be transmitted.
Another operation carried out by a sub-program is the operation for writing a word or a bit in the non-volatile programmable memory 16. The corresponding instructions form a sub-program placed in a zone Z2 of the read-only memory. In the same way, an operation for the erasure of all or part of the programmable memory 16 is carried out by a sub-program placed in a zone Z3 of the read-only memory 12.
According to the invention, it is provided that the first instructions of the zones Z1, Z2 and Z3 will be instructions for checking the state of the RS register, this register being directly accessible in reading mode by the microprocessor. If the result is positive (with normal conditions being detected by the sensors C1 to C4), the sub-program of the zone Z1, Z2 or Z3 respectively is carried out and the corresponding operation (transmission, writing or erasure respectively) is performed. If not, a routing instruction towards the zone ZF is carried out and the microprocessor is placed on definitive standby.
Given the fact that the instructions needed for the checking of the register occupy only some tens of bytes, placed at the start of two or three zones of sub-programs at a maximum, it is seen that the amount of ROM used to provide excellent security is not excessive. This is important, for the available ROM space is limited and should be reserved for numerous other essential operations for the management of the working of the microprocessor.

Claims (2)

What is claimed is:
1. An integrated circuit comprising:
a first memory means for storing application programs;
a second memory means which is programmable and non-volatile, for storing data;
at least one I/O port means;
a plurality of means for continually sensing ambient conditions or electrical conditions of the integrated circuit which fall outside a normal operating range;
register means for storing sensing information from the sensing means indicative of said ambient conditions or said electrical conditions of the integrated circuit which fall outside said normal operating range;
a microprocessor means connected to said first and second memory means, said I/O port means, and said register means;
said first memory means storing test subroutines for causing said microprocessor means to detect the presence or absence of said sensing information in said register means only in response to requests for the execution of one or more of said subroutines in the set consisting of;
(a) writing data to said second memory means;
(b) clearing data from said second memory means; or
(c) transmission of data from said second memory means, through the I/O port;
the microprocessor means being interrupted if said sensing information is found to be present in said register means.
2. An integrated circuit as set forth in claim 1 wherein interruption of the microprocessor means causes the microprocessor means to remain in a standby mode until reinitialized.
US08/384,531 1990-10-19 1994-10-05 System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts Expired - Lifetime US5465349A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US08/384,531 US5465349A (en) 1990-10-19 1994-10-05 System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
FR9012986 1990-10-19
FR9012986A FR2668274B1 (en) 1990-10-19 1990-10-19 INTEGRATED CIRCUIT WITH IMPROVED ACCESS SECURITY.
US77981791A 1991-10-21 1991-10-21
US08/384,531 US5465349A (en) 1990-10-19 1994-10-05 System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US77981791A Continuation 1990-10-19 1991-10-21

Publications (1)

Publication Number Publication Date
US5465349A true US5465349A (en) 1995-11-07

Family

ID=9401410

Family Applications (1)

Application Number Title Priority Date Filing Date
US08/384,531 Expired - Lifetime US5465349A (en) 1990-10-19 1994-10-05 System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts

Country Status (7)

Country Link
US (1) US5465349A (en)
EP (1) EP0481881B1 (en)
JP (1) JPH0719231B2 (en)
CA (1) CA2053741C (en)
DE (1) DE69100052T2 (en)
ES (1) ES2041549T3 (en)
FR (1) FR2668274B1 (en)

Cited By (49)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1998018102A1 (en) * 1996-10-22 1998-04-30 Reinhard Posch Method and arrangement for protecting electronic computing units, in particular chip cards
US5815652A (en) * 1995-05-31 1998-09-29 Hitachi, Ltd. Computer management system
US5948102A (en) * 1994-12-19 1999-09-07 Sgs Thomson Microelectronics Method and device to improve the security of an integrated circuit
US6167519A (en) * 1991-11-27 2000-12-26 Fujitsu Limited Secret information protection system
FR2795838A1 (en) 1999-06-30 2001-01-05 Bull Cp8 METHOD FOR SECURING THE PROCESSING OF SENSITIVE INFORMATION IN A MONOLITHIC SECURITY MODULE, AND ASSOCIATED SECURITY MODULE
US6185507B1 (en) * 1996-08-23 2001-02-06 Siemens Aktiengesellschaft Microprocessor, in particular for use in a chip card, with a control unit and with a housing surrounding the control unit
US6199173B1 (en) * 1997-10-01 2001-03-06 Micron Electronics, Inc. Method for mapping environmental resources to memory for program access
US6202160B1 (en) 1997-05-13 2001-03-13 Micron Electronics, Inc. System for independent powering of a computer system
US6223234B1 (en) 1998-07-17 2001-04-24 Micron Electronics, Inc. Apparatus for the hot swap and add of input/output platforms and devices
US6243773B1 (en) 1997-05-13 2001-06-05 Micron Electronics, Inc. Configuration management system for hot adding and hot replacing devices
US6247080B1 (en) 1997-05-13 2001-06-12 Micron Electronics, Inc. Method for the hot add of devices
US6249828B1 (en) 1997-05-13 2001-06-19 Micron Electronics, Inc. Method for the hot swap of a mass storage adapter on a system including a statically loaded adapter driver
US6253334B1 (en) 1997-05-13 2001-06-26 Micron Electronics, Inc. Three bus server architecture with a legacy PCI bus and mirrored I/O PCI buses
US6269412B1 (en) 1997-05-13 2001-07-31 Micron Technology, Inc. Apparatus for recording information system events
US6269417B1 (en) 1997-05-13 2001-07-31 Micron Technology, Inc. Method for determining and displaying the physical slot number of an expansion bus device
US6272648B1 (en) 1997-05-13 2001-08-07 Micron Electronics, Inc. System for communicating a software-generated pulse waveform between two servers in a network
US6275982B1 (en) * 1996-04-30 2001-08-14 Cp8 Transac Method and device enabling a fixed program to be developed
US6282673B1 (en) 1997-05-13 2001-08-28 Micron Technology, Inc. Method of recording information system events
US6292905B1 (en) 1997-05-13 2001-09-18 Micron Technology, Inc. Method for providing a fault tolerant network using distributed server processes to remap clustered network resources to other servers during server failure
US6324608B1 (en) 1997-05-13 2001-11-27 Micron Electronics Method for hot swapping of network components
US6332202B1 (en) 1997-05-13 2001-12-18 Micron Technology, Inc. Method of remote access and control of environmental conditions
US6338150B1 (en) * 1997-05-13 2002-01-08 Micron Technology, Inc. Diagnostic and managing distributed processor system
US6363497B1 (en) 1997-05-13 2002-03-26 Micron Technology, Inc. System for clustering software applications
WO2002050640A1 (en) * 2000-12-21 2002-06-27 Cp8 Technologies Method for making secure execution of a programme in a microprocessor-based electronic module
US6418492B1 (en) 1997-05-13 2002-07-09 Micron Electronics Method for computer implemented hot-swap and hot-add
US6438666B2 (en) * 1997-09-26 2002-08-20 Hughes Electronics Corporation Method and apparatus for controlling access to confidential data by analyzing property inherent in data
EP1233372A1 (en) * 2001-01-18 2002-08-21 Philips Corporate Intellectual Property GmbH Circuit and method for protecting a chip arrangement against manipulation and/or against abuse
US6499073B1 (en) 1997-05-13 2002-12-24 Micron Electronics, Inc. System using programmable processor for selectively enabling or disabling power to adapter in response to respective request signals
US6510501B1 (en) 1999-05-11 2003-01-21 National Semiconductor Corporation Non-volatile memory read/write security protection feature selection through non-volatile memory bits
US20030133241A1 (en) * 2001-12-29 2003-07-17 Markus Feuser Method and arrangement for protecting digital parts of circuits
FR2835638A1 (en) * 2002-02-05 2003-08-08 Samsung Electronics Co Ltd INTEGRATED CIRCUIT HAVING A SAFETY FUNCTION, CHIP CARD USING THIS CIRCUIT AND PROCESS FOR CHECKING THE OPERATION OF AN INTEGRATED CIRCUIT
US20030177373A1 (en) * 2002-03-18 2003-09-18 Moyer William C. Integrated circuit security and method therefor
EP1094423A3 (en) * 1999-10-19 2004-01-07 Hitachi, Ltd. Card observing method
US6697963B1 (en) 1997-05-13 2004-02-24 Micron Technology, Inc. Method of updating a system environmental setting
WO2004049349A2 (en) * 2002-11-22 2004-06-10 Philips Intellectual Property & Standards Gmbh Circuit arrangement with non-volatile memory module and method for registering light-attacks on the non-volatile memory module
WO2004063910A1 (en) 2003-01-10 2004-07-29 Philips Intellectual Property & Standards Gmbh Circuit arrangement and method for protecting electronic components against illicit manipulation
US20050092848A1 (en) * 2002-05-24 2005-05-05 Infineon Technologies Ag Integrated circuit having an active shield
DE102004015546A1 (en) * 2004-03-30 2005-10-20 Infineon Technologies Ag Semiconductor chip for security-relevant applications with integrated circuit has light-sensitive state change device that alters state stored in state storage device when light incident and stored state monitoring device
EP1659515A1 (en) * 2004-11-19 2006-05-24 Proton World International N.V. Protection for a microcontroller
EP1715436A2 (en) * 2005-04-21 2006-10-25 St Microelectronics S.A. Protection of program execution performed by an integrated circuit or the data stored in this circuit
KR100649882B1 (en) 2005-07-19 2006-11-27 삼성전자주식회사 Abnormal condition detection circuit, integrated circuit card having the circuit, and method for operating cpu
CN100390734C (en) * 2005-09-22 2008-05-28 华为技术有限公司 Method for processing device state relative news
CN100442071C (en) * 2002-04-09 2008-12-10 Nxp股份有限公司 Method and arrangement for protecting a chip and checking its authenticity
US20090218924A1 (en) * 2008-03-03 2009-09-03 Ushio Denki Kabushiki Kaisha Light source for ultraviolet ray irradiation
US20100013631A1 (en) * 2008-07-16 2010-01-21 Infineon Technologies Ag Alarm recognition
US20110007567A1 (en) * 2007-01-05 2011-01-13 Jean-Louis Modave Temporary locking of an electronic circuit
US20110010775A1 (en) * 2007-01-05 2011-01-13 Proton World International N.V. Protection of information contained in an electronic circuit
US20110122694A1 (en) * 2007-01-05 2011-05-26 Proton World International N.V. Limitation of the access to a resource of an electronic circuit
CN104376357A (en) * 2014-08-27 2015-02-25 北京中电华大电子设计有限责任公司 Light attack resisting method for intelligent card

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3731736A1 (en) * 1986-09-27 1988-04-07 Toshiba Kawasaki Kk Processing system for a portable electronic device
JP2746801B2 (en) * 1992-08-27 1998-05-06 三菱電機株式会社 IC card and password verification method for IC card
US5509076A (en) * 1994-05-02 1996-04-16 General Instrument Corporation Of Delaware Apparatus for securing the integrity of a functioning system
WO1997002543A1 (en) * 1995-07-05 1997-01-23 International Business Machines Corporation Processing of long messages in a process card
FR2738008B1 (en) * 1995-08-25 1997-11-07 Total Raffinage Distribution USE OF A VERY HARD BITUMINOUS BINDER IN THE PREPARATION OF A BITUMINOUS COATING, IN PARTICULAR FOR GROUNDWORKS
EP0867015B1 (en) * 1995-12-14 1999-08-04 Landis & Gyr Technology Innovation AG Additional safety feature for chip cards
DE19610070A1 (en) * 1996-03-14 1997-09-18 Siemens Ag Smart card
EP1194884B1 (en) 1999-05-21 2003-04-09 Infineon Technologies AG Method for preventing the unauthorized use of chip cards
DE19947574A1 (en) * 1999-10-01 2001-04-12 Giesecke & Devrient Gmbh Process for securing a data storage
EP1100058A1 (en) * 1999-11-12 2001-05-16 Infineon Technologies AG Electronic component and method for protecting an integrated circuit included in the component
CN101292249A (en) * 2005-10-24 2008-10-22 Nxp股份有限公司 Semiconductor device and method for preventing attacks on the semiconductor device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
DE3706466A1 (en) * 1987-02-27 1988-09-08 Siemens Ag Portable operating unit for smart cards
US4827149A (en) * 1986-10-09 1989-05-02 Sharp Kabushiki Kaisha Operation halting circuit
EP0341712A2 (en) * 1988-05-13 1989-11-15 Oki Electric Industry Company, Limited IC card having means for protecting erroneous operation
US4939353A (en) * 1987-01-22 1990-07-03 Kabushiki Kaisha Toshiba Processing system for enabling data communication with a self-diagnose device
US5204840A (en) * 1989-08-08 1993-04-20 Mazur Jeffrey G Means and methods for preserving microprocessor memory
US5206938A (en) * 1989-05-09 1993-04-27 Mitsubishi Denki Kabushiki Kaisha Ic card with memory area protection based on address line restriction
US5218607A (en) * 1989-06-23 1993-06-08 Kabushiki Kaisha Toshiba Computer having a resume function and operable on an internal power source

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US4827149A (en) * 1986-10-09 1989-05-02 Sharp Kabushiki Kaisha Operation halting circuit
US4939353A (en) * 1987-01-22 1990-07-03 Kabushiki Kaisha Toshiba Processing system for enabling data communication with a self-diagnose device
DE3706466A1 (en) * 1987-02-27 1988-09-08 Siemens Ag Portable operating unit for smart cards
EP0341712A2 (en) * 1988-05-13 1989-11-15 Oki Electric Industry Company, Limited IC card having means for protecting erroneous operation
US5206938A (en) * 1989-05-09 1993-04-27 Mitsubishi Denki Kabushiki Kaisha Ic card with memory area protection based on address line restriction
US5218607A (en) * 1989-06-23 1993-06-08 Kabushiki Kaisha Toshiba Computer having a resume function and operable on an internal power source
US5204840A (en) * 1989-08-08 1993-04-20 Mazur Jeffrey G Means and methods for preserving microprocessor memory

Cited By (91)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6167519A (en) * 1991-11-27 2000-12-26 Fujitsu Limited Secret information protection system
US5948102A (en) * 1994-12-19 1999-09-07 Sgs Thomson Microelectronics Method and device to improve the security of an integrated circuit
US5815652A (en) * 1995-05-31 1998-09-29 Hitachi, Ltd. Computer management system
US6044476A (en) * 1995-05-31 2000-03-28 Hitachi, Ltd. Computer management system
US7089451B2 (en) 1995-05-31 2006-08-08 Hitachi, Ltd. Computer management system
US6275982B1 (en) * 1996-04-30 2001-08-14 Cp8 Transac Method and device enabling a fixed program to be developed
US6185507B1 (en) * 1996-08-23 2001-02-06 Siemens Aktiengesellschaft Microprocessor, in particular for use in a chip card, with a control unit and with a housing surrounding the control unit
CN1133936C (en) * 1996-08-23 2004-01-07 西门子公司 Microprocessor, particularly for use in chip card with control unit and housing surrounding control unit
WO1998018102A1 (en) * 1996-10-22 1998-04-30 Reinhard Posch Method and arrangement for protecting electronic computing units, in particular chip cards
US7370226B2 (en) 1997-05-13 2008-05-06 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US6681342B2 (en) 1997-05-13 2004-01-20 Micron Technology, Inc. Diagnostic and managing distributed processor system
US6243773B1 (en) 1997-05-13 2001-06-05 Micron Electronics, Inc. Configuration management system for hot adding and hot replacing devices
US6247080B1 (en) 1997-05-13 2001-06-12 Micron Electronics, Inc. Method for the hot add of devices
US6895526B2 (en) 1997-05-13 2005-05-17 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US6253334B1 (en) 1997-05-13 2001-06-26 Micron Electronics, Inc. Three bus server architecture with a legacy PCI bus and mirrored I/O PCI buses
US6269412B1 (en) 1997-05-13 2001-07-31 Micron Technology, Inc. Apparatus for recording information system events
US6269417B1 (en) 1997-05-13 2001-07-31 Micron Technology, Inc. Method for determining and displaying the physical slot number of an expansion bus device
US6272648B1 (en) 1997-05-13 2001-08-07 Micron Electronics, Inc. System for communicating a software-generated pulse waveform between two servers in a network
US6202160B1 (en) 1997-05-13 2001-03-13 Micron Electronics, Inc. System for independent powering of a computer system
US6282673B1 (en) 1997-05-13 2001-08-28 Micron Technology, Inc. Method of recording information system events
US6292905B1 (en) 1997-05-13 2001-09-18 Micron Technology, Inc. Method for providing a fault tolerant network using distributed server processes to remap clustered network resources to other servers during server failure
US6324608B1 (en) 1997-05-13 2001-11-27 Micron Electronics Method for hot swapping of network components
US6332202B1 (en) 1997-05-13 2001-12-18 Micron Technology, Inc. Method of remote access and control of environmental conditions
US6338150B1 (en) * 1997-05-13 2002-01-08 Micron Technology, Inc. Diagnostic and managing distributed processor system
US6363497B1 (en) 1997-05-13 2002-03-26 Micron Technology, Inc. System for clustering software applications
US8468372B2 (en) 1997-05-13 2013-06-18 Round Rock Research, Llc Diagnostic and managing distributed processor system
US7669064B2 (en) 1997-05-13 2010-02-23 Micron Technology, Inc. Diagnostic and managing distributed processor system
US6418492B1 (en) 1997-05-13 2002-07-09 Micron Electronics Method for computer implemented hot-swap and hot-add
US7552364B2 (en) 1997-05-13 2009-06-23 Micron Technology, Inc. Diagnostic and managing distributed processor system
US7451343B2 (en) 1997-05-13 2008-11-11 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US6484226B2 (en) 1997-05-13 2002-11-19 Micron Technology, Inc. System and method for the add or swap of an adapter on an operating computer
US6499073B1 (en) 1997-05-13 2002-12-24 Micron Electronics, Inc. System using programmable processor for selectively enabling or disabling power to adapter in response to respective request signals
US7444550B2 (en) 1997-05-13 2008-10-28 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US7444537B2 (en) 1997-05-13 2008-10-28 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US6598173B1 (en) 1997-05-13 2003-07-22 Micron Technology, Inc. Method of remote access and control of environmental conditions
US6604207B2 (en) 1997-05-13 2003-08-05 Micron Technology, Inc. System architecture for remote access and control of environmental management
US7370225B2 (en) 1997-05-13 2008-05-06 Micron Technology, Inc. System and method for communicating a software-generated pulse waveform between two servers in a network
US7263570B2 (en) 1997-05-13 2007-08-28 Micron Technology, Inc. Method of providing an interface to a plurality of peripheral devices using bus adapter chips
US7065600B2 (en) 1997-05-13 2006-06-20 Micron Technology, Inc. Method of providing an interface to a plurality of peripheral devices using bus adapter chips
US6249828B1 (en) 1997-05-13 2001-06-19 Micron Electronics, Inc. Method for the hot swap of a mass storage adapter on a system including a statically loaded adapter driver
US6742069B2 (en) 1997-05-13 2004-05-25 Micron Technology, Inc. Method of providing an interface to a plurality of peripheral devices using bus adapter chips
US6697963B1 (en) 1997-05-13 2004-02-24 Micron Technology, Inc. Method of updating a system environmental setting
US6701453B2 (en) 1997-05-13 2004-03-02 Micron Technology, Inc. System for clustering software applications
US6438666B2 (en) * 1997-09-26 2002-08-20 Hughes Electronics Corporation Method and apparatus for controlling access to confidential data by analyzing property inherent in data
US6199173B1 (en) * 1997-10-01 2001-03-06 Micron Electronics, Inc. Method for mapping environmental resources to memory for program access
US6223234B1 (en) 1998-07-17 2001-04-24 Micron Electronics, Inc. Apparatus for the hot swap and add of input/output platforms and devices
US6510501B1 (en) 1999-05-11 2003-01-21 National Semiconductor Corporation Non-volatile memory read/write security protection feature selection through non-volatile memory bits
FR2795838A1 (en) 1999-06-30 2001-01-05 Bull Cp8 METHOD FOR SECURING THE PROCESSING OF SENSITIVE INFORMATION IN A MONOLITHIC SECURITY MODULE, AND ASSOCIATED SECURITY MODULE
WO2001003084A1 (en) 1999-06-30 2001-01-11 Bull Cp8 Method for making secure a sensitive information processing in a monolithic security module, and associated security module
US7330979B1 (en) * 1999-06-30 2008-02-12 Cp8 Technologies Method for protecting the processing of sensitive information in a monolithic security module, and associate security module
EP1094423A3 (en) * 1999-10-19 2004-01-07 Hitachi, Ltd. Card observing method
FR2818766A1 (en) * 2000-12-21 2002-06-28 Bull Cp8 METHOD FOR SECURING THE EXECUTION OF AN IMPLANTED PROGRAM IN AN ELECTRONIC MODULE WITH MICROPROCESSOR, AS WELL AS THE ELECTRONIC MODULE AND THE MICROCIRCUIT CARD THEREOF
WO2002050640A1 (en) * 2000-12-21 2002-06-27 Cp8 Technologies Method for making secure execution of a programme in a microprocessor-based electronic module
EP1233372A1 (en) * 2001-01-18 2002-08-21 Philips Corporate Intellectual Property GmbH Circuit and method for protecting a chip arrangement against manipulation and/or against abuse
US20030133241A1 (en) * 2001-12-29 2003-07-17 Markus Feuser Method and arrangement for protecting digital parts of circuits
KR100471147B1 (en) * 2002-02-05 2005-03-08 삼성전자주식회사 Semiconductor integrated circuit with security function
FR2835638A1 (en) * 2002-02-05 2003-08-08 Samsung Electronics Co Ltd INTEGRATED CIRCUIT HAVING A SAFETY FUNCTION, CHIP CARD USING THIS CIRCUIT AND PROCESS FOR CHECKING THE OPERATION OF AN INTEGRATED CIRCUIT
US20030177373A1 (en) * 2002-03-18 2003-09-18 Moyer William C. Integrated circuit security and method therefor
US7266848B2 (en) 2002-03-18 2007-09-04 Freescale Semiconductor, Inc. Integrated circuit security and method therefor
CN100442071C (en) * 2002-04-09 2008-12-10 Nxp股份有限公司 Method and arrangement for protecting a chip and checking its authenticity
US20050092848A1 (en) * 2002-05-24 2005-05-05 Infineon Technologies Ag Integrated circuit having an active shield
US6962294B2 (en) * 2002-05-24 2005-11-08 Infineon Technologie Ag Integrated circuit having an active shield
US7232983B2 (en) * 2002-11-22 2007-06-19 Nxp B.V. Circuit arrangement with non-volatile memory module and method for registering light-attacks on the non-volatile memory module
WO2004049349A2 (en) * 2002-11-22 2004-06-10 Philips Intellectual Property & Standards Gmbh Circuit arrangement with non-volatile memory module and method for registering light-attacks on the non-volatile memory module
WO2004049349A3 (en) * 2002-11-22 2004-07-29 Philips Intellectual Property Circuit arrangement with non-volatile memory module and method for registering light-attacks on the non-volatile memory module
CN1714408B (en) * 2002-11-22 2012-07-18 艾普契科技有限公司 Circuit arrangement and method for registering light-attacks
US20060011816A1 (en) * 2002-11-22 2006-01-19 Koninklijke Philips Electronics N.V. Circuit arrangement with non-volatile memory module and method for registeting light- attacks on the non-volatile memory module
US20060090211A1 (en) * 2003-01-10 2006-04-27 Koninklijke Phillips Electronics N.C. Circuit arrangement and method for protecting electronic components against illicit manipulation
WO2004063910A1 (en) 2003-01-10 2004-07-29 Philips Intellectual Property & Standards Gmbh Circuit arrangement and method for protecting electronic components against illicit manipulation
CN100351730C (en) * 2003-01-10 2007-11-28 皇家飞利浦电子股份有限公司 Circuit arrangement and method for protecting electronic components against illicit manipulation
US7836516B2 (en) 2003-01-10 2010-11-16 Nxp B.V. Circuit arrangement and method for protecting electronic components against illicit manipulation
DE102004015546B4 (en) * 2004-03-30 2011-05-12 Infineon Technologies Ag An integrated circuit semiconductor chip and method for securing a semiconductor integrated circuit
DE102004015546A1 (en) * 2004-03-30 2005-10-20 Infineon Technologies Ag Semiconductor chip for security-relevant applications with integrated circuit has light-sensitive state change device that alters state stored in state storage device when light incident and stored state monitoring device
EP1659515A1 (en) * 2004-11-19 2006-05-24 Proton World International N.V. Protection for a microcontroller
US20060112436A1 (en) * 2004-11-19 2006-05-25 Proton World International N.V. Protection of a microcontroller
US7516902B2 (en) 2004-11-19 2009-04-14 Proton World International N.V. Protection of a microcontroller
EP1715436A2 (en) * 2005-04-21 2006-10-25 St Microelectronics S.A. Protection of program execution performed by an integrated circuit or the data stored in this circuit
US7503501B2 (en) * 2005-07-19 2009-03-17 Samsung Electronics Co., Ltd. Abnormal condition detection circuit, integrated circuit card having the circuit, and method of operating CPU
US20090218406A1 (en) * 2005-07-19 2009-09-03 Samsung Electronics Co., Ltd. Abnormal Condition Detection Circuit, Integrated Circuit Card Having the Circuit, and Method of Operating CPU
US20070018003A1 (en) * 2005-07-19 2007-01-25 Samsung Electronics Co., Ltd. Abnormal condition detection circuit, integrated circuit card having the circuit, and method of operating CPU
KR100649882B1 (en) 2005-07-19 2006-11-27 삼성전자주식회사 Abnormal condition detection circuit, integrated circuit card having the circuit, and method for operating cpu
CN100390734C (en) * 2005-09-22 2008-05-28 华为技术有限公司 Method for processing device state relative news
US20110007567A1 (en) * 2007-01-05 2011-01-13 Jean-Louis Modave Temporary locking of an electronic circuit
US20110010775A1 (en) * 2007-01-05 2011-01-13 Proton World International N.V. Protection of information contained in an electronic circuit
US20110122694A1 (en) * 2007-01-05 2011-05-26 Proton World International N.V. Limitation of the access to a resource of an electronic circuit
US8411504B2 (en) 2007-01-05 2013-04-02 Proton World International N.V. Limitation of the access to a resource of an electronic circuit
US8566931B2 (en) * 2007-01-05 2013-10-22 Proton World International N.V. Protection of information contained in an electronic circuit
US9036414B2 (en) 2007-01-05 2015-05-19 Proton World International N.V. Temporary locking of an electronic circuit to protect data contained in the electronic circuit
US20090218924A1 (en) * 2008-03-03 2009-09-03 Ushio Denki Kabushiki Kaisha Light source for ultraviolet ray irradiation
US20100013631A1 (en) * 2008-07-16 2010-01-21 Infineon Technologies Ag Alarm recognition
CN104376357A (en) * 2014-08-27 2015-02-25 北京中电华大电子设计有限责任公司 Light attack resisting method for intelligent card

Also Published As

Publication number Publication date
DE69100052T2 (en) 1993-08-05
JPH04264643A (en) 1992-09-21
FR2668274A1 (en) 1992-04-24
CA2053741A1 (en) 1992-04-20
EP0481881B1 (en) 1993-03-24
DE69100052D1 (en) 1993-04-29
JPH0719231B2 (en) 1995-03-06
CA2053741C (en) 1996-07-16
ES2041549T3 (en) 1993-11-16
EP0481881A1 (en) 1992-04-22
FR2668274B1 (en) 1992-12-31

Similar Documents

Publication Publication Date Title
US5465349A (en) System for monitoring abnormal integrated circuit operating conditions and causing selective microprocessor interrupts
US4685056A (en) Computer security device
CA2312096C (en) Mass storage data protection device for a gaming machine
CA2031506C (en) Protection system for a memory cartridge
JP5041980B2 (en) Data processing circuit and communication portable terminal device
US6883075B2 (en) Microcontroller having embedded non-volatile memory with read protection
CA2381162C (en) Data processing device having protected memory and corresponding method
US5948102A (en) Method and device to improve the security of an integrated circuit
CA2489637C (en) Electronic data processing device
US5974482A (en) Single port first-in-first-out (FIFO) device having overwrite protection and diagnostic capabilities
US20030196054A1 (en) Chip card with integrated circuit
JP3995883B2 (en) Memory protection system for multitasking systems
US6813191B2 (en) Microcomputer with nonvolatile memory protected against false erasing or writing
JP2001527669A (en) Integrated circuit and test method for the integrated circuit
US5592650A (en) Computer apparatus and method for replacing programs between memories by employing protection mechanism with write enable generation scheme
US5222232A (en) Apparatus and method for monitoring prom access in a microcomputer
JP7247638B2 (en) Electronic information storage medium, IC card, falsification check method, and program
JP3039479B2 (en) Extended BIOS protection system
JPS6329859A (en) Memory protection circuit
JPH08129508A (en) Computer system and its shared memory control method
KR100213206B1 (en) Write protection means for semiconductor memory
JPH11282992A (en) Ic card
JPH0954710A (en) Ic card
JPH05241966A (en) Memory controller
JPH0293746A (en) Electronic equipment

Legal Events

Date Code Title Description
STCF Information on status: patent grant

Free format text: PATENTED CASE

FEPP Fee payment procedure

Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

REMI Maintenance fee reminder mailed
FPAY Fee payment

Year of fee payment: 4

SULP Surcharge for late payment
FPAY Fee payment

Year of fee payment: 8

FPAY Fee payment

Year of fee payment: 12